Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 13:47
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
247KB
-
MD5
db0915efc5df3cca31e05b8b3ac0f5ee
-
SHA1
6d25d1ba8cc8716b6c9f40d6fc998b174418c2bb
-
SHA256
344cdf9460d4d63a1cd728f6edaaf15cdbd540058dc8cb5a48a059a380fe21a4
-
SHA512
86126487cd2d78a82e284922eb187280123506d5c9a875c1178f5b35e28784d72507baefcb662061eb20b4ff8633634dd47f251bf93e46707981d91814d55433
-
SSDEEP
3072:ufniykEWHMXNrACbZ6rDLrBoVDf78BOIKWwtY1:ekEWH+JDbZ6SIOOwt
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4912 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\nzlnwqzh\ImagePath = "C:\\Windows\\SysWOW64\\nzlnwqzh\\rhdsnfdl.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation file.exe -
Executes dropped EXE 1 IoCs
pid Process 2404 rhdsnfdl.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2404 set thread context of 1864 2404 rhdsnfdl.exe 96 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 776 sc.exe 1400 sc.exe 4908 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 208 wrote to memory of 2888 208 file.exe 83 PID 208 wrote to memory of 2888 208 file.exe 83 PID 208 wrote to memory of 2888 208 file.exe 83 PID 208 wrote to memory of 2372 208 file.exe 85 PID 208 wrote to memory of 2372 208 file.exe 85 PID 208 wrote to memory of 2372 208 file.exe 85 PID 208 wrote to memory of 776 208 file.exe 88 PID 208 wrote to memory of 776 208 file.exe 88 PID 208 wrote to memory of 776 208 file.exe 88 PID 208 wrote to memory of 1400 208 file.exe 89 PID 208 wrote to memory of 1400 208 file.exe 89 PID 208 wrote to memory of 1400 208 file.exe 89 PID 208 wrote to memory of 4908 208 file.exe 91 PID 208 wrote to memory of 4908 208 file.exe 91 PID 208 wrote to memory of 4908 208 file.exe 91 PID 208 wrote to memory of 4912 208 file.exe 94 PID 208 wrote to memory of 4912 208 file.exe 94 PID 208 wrote to memory of 4912 208 file.exe 94 PID 2404 wrote to memory of 1864 2404 rhdsnfdl.exe 96 PID 2404 wrote to memory of 1864 2404 rhdsnfdl.exe 96 PID 2404 wrote to memory of 1864 2404 rhdsnfdl.exe 96 PID 2404 wrote to memory of 1864 2404 rhdsnfdl.exe 96 PID 2404 wrote to memory of 1864 2404 rhdsnfdl.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\nzlnwqzh\2⤵PID:2888
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\rhdsnfdl.exe" C:\Windows\SysWOW64\nzlnwqzh\2⤵PID:2372
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create nzlnwqzh binPath= "C:\Windows\SysWOW64\nzlnwqzh\rhdsnfdl.exe /d\"C:\Users\Admin\AppData\Local\Temp\file.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:776
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description nzlnwqzh "wifi internet conection"2⤵
- Launches sc.exe
PID:1400
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start nzlnwqzh2⤵
- Launches sc.exe
PID:4908
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4912
-
-
C:\Windows\SysWOW64\nzlnwqzh\rhdsnfdl.exeC:\Windows\SysWOW64\nzlnwqzh\rhdsnfdl.exe /d"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
PID:1864
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.9MB
MD5b6600edba5205d1d244de1f48ee86621
SHA19d9075082842ab8ba81e70aaa5b62238adbdec79
SHA256234403e857d40575c578d34c43fe806ab6dbf1f36a0fb4695a4b88ba8b507c96
SHA51289a216517cbbc23d26ff6783ddbc9a6c6ff66bfc2aa5a629d5c274f06c346279d54c951ad9c674c88b5679135734b29ddf9232c56e0d954963366717df96e8db
-
Filesize
13.9MB
MD5b6600edba5205d1d244de1f48ee86621
SHA19d9075082842ab8ba81e70aaa5b62238adbdec79
SHA256234403e857d40575c578d34c43fe806ab6dbf1f36a0fb4695a4b88ba8b507c96
SHA51289a216517cbbc23d26ff6783ddbc9a6c6ff66bfc2aa5a629d5c274f06c346279d54c951ad9c674c88b5679135734b29ddf9232c56e0d954963366717df96e8db